Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 23:48
Behavioral task
behavioral1
Sample
ce2dc5dc3b0c340d32e1c318407eb382_JaffaCakes118.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce2dc5dc3b0c340d32e1c318407eb382_JaffaCakes118.xls
Resource
win10v2004-20240802-en
General
-
Target
ce2dc5dc3b0c340d32e1c318407eb382_JaffaCakes118.xls
-
Size
49KB
-
MD5
ce2dc5dc3b0c340d32e1c318407eb382
-
SHA1
95483d2bdec996ed52acaa9a5601395a1560fc91
-
SHA256
2582f28c02b7aa7f23c3769e21292a5ea40249694acac347b9d3bf1462352a5a
-
SHA512
078835ffc374543c5b29f446b252f316cb1958a1e34086ace60c4eb79a60084eee878b57ea29c99572cfdd38a36a143b0563b541c57e459239bb1d7d1c2f4b5f
-
SSDEEP
1536:YTvX/7uDphYHceXVhca+fMHLtyeGxcl8/dgqD6yzsF6BCKz4I6+Qe:G/7uDphYHceXVhca+fMHLtyeGxcl8/dV
Malware Config
Extracted
http://pramars.xyz/psswhqxs/222222.png
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2384 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 2384 EXCEL.EXE 2384 EXCEL.EXE 2384 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ce2dc5dc3b0c340d32e1c318407eb382_JaffaCakes118.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2384